Results 51 to 60 of about 1,025 (182)

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Attack Resilient Microgrid: Impact Characterisation, Online Anomaly Detection and Mitigation

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
This paper proposes an attack‐resilient control framework for grid‐connected microgrids that enable real‐time detection and mitigation of stealthy cyber‐physical attacks on control and measurement signals. Using an online LSTM‐based anomaly detection system and a model‐based mitigation strategy, the framework maintains near‐optimal performance even ...
Nazmus Saqib   +3 more
wiley   +1 more source

SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security

open access: yesIEEE Access
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of Multi-Factor Authentication (MFA) to enhance user verification.
Afjal H. Sarower   +4 more
doaj   +1 more source

Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali   +4 more
wiley   +1 more source

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]

open access: yesProceedings on Engineering Sciences
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain   +2 more
doaj   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids

open access: yesIEEE Access
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri   +2 more
doaj   +1 more source

Agent‐based ARP cache poisoning detection in switched LAN environments

open access: yesIET Networks, 2019
Address resolution protocol (ARP) cache poisoning is mostly used to perform man‐in‐the‐middle (MITM) and denial of service (DoS) attacks for sniffing and network services disruption, respectively, in switch LAN networks.
Daniyal Sakhawat   +3 more
doaj   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Home - About - Disclaimer - Privacy